Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18-09-2022 23:28
Static task
static1
Behavioral task
behavioral1
Sample
0eab3ce24122f7d7bcf6b054c24ad31b27fe3fc63fe362b02799a1ee4736f5e1.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0eab3ce24122f7d7bcf6b054c24ad31b27fe3fc63fe362b02799a1ee4736f5e1.dll
Resource
win10v2004-20220812-en
General
-
Target
0eab3ce24122f7d7bcf6b054c24ad31b27fe3fc63fe362b02799a1ee4736f5e1.dll
-
Size
33KB
-
MD5
7c58fe0b4deca30921fe964aa1e3a8ce
-
SHA1
0731cd54ca97839caef9ea1e91b8213e6569cad4
-
SHA256
0eab3ce24122f7d7bcf6b054c24ad31b27fe3fc63fe362b02799a1ee4736f5e1
-
SHA512
0fafca600074096fc8cde931f1f69d3e7b8715ad489c090ce647c6ac59ac0e36ccce784b1d5182946f703f477ec0e261dfa75eceffdc268ed6bd3d631f088df3
-
SSDEEP
768:BBB+Ys5Z405OOtG2YS63TX/7gqLjB7cO40ERUAa0e:vB+Ys5ZlnG2YBjv7gqLC2ERUWe
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28 PID 1440 wrote to memory of 872 1440 rundll32.exe 28
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eab3ce24122f7d7bcf6b054c24ad31b27fe3fc63fe362b02799a1ee4736f5e1.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eab3ce24122f7d7bcf6b054c24ad31b27fe3fc63fe362b02799a1ee4736f5e1.dll,#12⤵PID:872
-